Cryptographic Challenges and Security in Post Quantum Cryptography Migration: A Prospective Approach.
Anoop Kumar PandeyAashish BanatiBalaji RajendranSithu D. SudarsanK. K. Soundra PandianPublished in: PKIA (2023)
Keyphrases
- information security
- public key cryptography
- cryptographic algorithms
- elliptic curve cryptography
- security protocols
- smart card
- cryptographic protocols
- security issues
- key management
- security properties
- security problems
- security concerns
- security requirements
- public key
- lessons learned
- security threats
- security and privacy issues
- network security
- encryption algorithms
- elliptic curve
- security mechanisms
- encryption scheme
- security analysis
- random number generator
- stream cipher
- security services
- encryption decryption
- access control
- security level
- cellular automata
- authentication scheme
- secure communication
- intrusion detection
- data security
- public key infrastructure
- biometric data
- advanced encryption standard
- encryption key
- ad hoc networks
- security model
- quantum computing
- security systems
- provably secure
- security policies
- digital watermark
- digital signature
- information systems
- fuzzy vault